scispace - formally typeset
Proceedings ArticleDOI

A secure, imperceptible yet perceptually salient, spread spectrum watermark for multimedia

Reads0
Chats0
TLDR
A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Abstract
We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to a perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently water-marked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, and requantization, including dithering and recompression and rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unambiguously identifies the owner, and the watermark can be constructed to make counterfeiting almost impossible. Experimental results are presented to support these claims.

read more

Citations
More filters
Journal ArticleDOI

Collusion-secure fingerprinting for digital data

TL;DR: This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.
Patent

Watermark embedder and reader

TL;DR: A watermark system includes an embedder, detector, and reader as mentioned in this paper, which can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.
Patent

Computer system linked by using information in data objects

TL;DR: In this paper, various improvements to steganographic systems, and applications, are disclosed, such as facilitating scale and rotation registration, improving robustness, and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration.
Patent

Methods for surveying dissemination of proprietary empirical data

TL;DR: In this article, an automated system checks networked computers such as computers on the internet, for watermarked audio, video, or image data, and provides a report listing the location of such audio or video data, provided to the proprietor(s) thereof identified by the watermark information.
Patent

Integrating digital watermarks in multimedia content

TL;DR: In this paper, a copy control method for decoding auxiliary data from media signals in multimedia content decodes watermarks from different media signals and uses the watermarks to control processing of the multimedia content.
References
More filters
Journal ArticleDOI

Theory of Spread-Spectrum Communications--A Tutorial

TL;DR: It is the intention of this paper to provide a tutorial treatment of the theory of spread-spectrum communications, including a discussion on the applications referred to, on the properties of common spreading sequences, and on techniques that can be used for acquisition and tracking.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Proceedings ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.

Towards Robust and Hidden Image Copyright Labeling

Eckhard Koch, +1 more
TL;DR: A method using a JPEG model based, frequency hopped, randomly sequenced pulse position modulated code (RSPPMC) is described, which supports robustness of embedded labels against several damaging possibilities such as lossy data compression, low pass filtering and/or color space conversion.
Proceedings ArticleDOI

Electronic marking and identification techniques to discourage document copying

TL;DR: Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document.